Tools

"... Schultz, Wolfram. Predictive reward signal of dopamine neurons. is called rewards, which elicit and reinforce approach behav-J. Neurophysiol. 80: 1–27, 1998. The effects of lesions, receptor ior. The functions of rewards were developed further during blocking, electrical self-stimulation, and drugs ..."

environmental stimuli with appe- Despite their importance, rewards do not influence the brain titive value, predict and detect rewards and signal alerting and motivating events. By failing to discriminate between different

"... Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can simultaneous ..."

Statistical procedures for missing data have vastly improved, yet misconception and unsound practice still abound. The authors frame the missing-data problem, review methods, offer advice, and raise issues that remain unresolved. They clear up common misunderstandings regarding the missing at random (MAR) concept. They summarize the evidence against older procedures and, with few exceptions, dis-courage their use. They present, in both technical and practical language, 2 general approaches that come highly recommended: maximum likelihood (ML) and Bayes-ian multiple imputation (MI). Newer developments are discussed, including some for dealing with missing data that are not MAR. Although not yet in the main-stream, these procedures may eventually extend the ML and MI methods that currently represent the state of the art. Why do missing data create such difficulty in sci-entific research? Because most data analysis proce-dures were not designed for them. Missingness is usu-ally a nuisance, not the main focus of inquiry, but

"... Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University ..."

Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University

"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of ..."

, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance

"... Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational ” correlation; organizations typically employ privacy policies that prohibit the exchange ..."

the exchange of information outside of the organization. However, “inter-organizational ” Internet-scale correlation holds promise given its potential role in both software fault maintenance and vulnerability detection. In this thesis, I reconcile these opposing forces via the use of privacypreservation

"... Event correlation is a widely-used data processing methodology for a broad variety of applications, and is especially useful in the context of distributed monitoring for software faults and vulnerabilities. However, most existing solutions have typically been focused on “intraorganizational” correla ..."

software maintenance and software vulnerability exploits. In this proposal, I present a framework for reconciling these opposing forces in event correlation via the use of privacypreservation integrated into the event processing framework. By integrating flexible privacy policies, we enable

"... iii More and more of our daily activities are using the Internet to provide an easy way to get access to instant information. The equipment enabling these interactions is also storing information such as: access time, where you are, and what you plan to do. The ability to store this information is v ..."

, by designing and analysing privacypreserving protocols. The theory for creating privacypreserving protocols began with the notion of oblivious transfer, which was first published by Rabin in 1981. Oblivious transfer is defined for two players Alice and Bob,

"... The spectre of climate change that is unfolding now is undeniably a cumulative impact of anthropogenic interference in the climate system over the last two centuries. The science is clear and the policy community is being increasingly convinced and galvanised into action to address this emergent cha ..."

The spectre of climate change that is unfolding now is undeniably a cumulative impact of anthropogenic interference in the climate system over the last two centuries. The science is clear and the policy community is being increasingly convinced and galvanised into action to address this emergent challenge in light of the associated economic and human dimensions. The impacts of climate change ranging from sea level rise, melting ice caps and glaciers, severe weather events, drought, flooding, warming, subtle changes in ecosystems – will impinge on every aspect of society and economic life. The costs of inaction will more than outweigh the costs of action. There is only a narrow window of opportunity to redress the situation. The Intergovernmental Panel on Climate Change (IPCC) in its Fourth Assessment Report has